![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 46
Volume 46, June 2019
- Ankur Lohachab
, Bidhan Karambir:
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. 1-12
- Salvatore Carta, Gianni Fenu, Diego Reforgiato Recupero
, Roberto Saia
:
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model. 13-22 - K. Abhimanyu Kumar Patro
, Bibhudendra Acharya
:
An efficient colour image encryption scheme based on 1-D chaotic maps. 23-41 - Defu Wang, Xiaojuan Wang
, Yong Zhang
, Lei Jin:
Detection of power grid disturbances and cyber-attacks based on machine learning. 42-52 - Rami Mustafa A. Mohammad
, Mohammed Abdulrahman Alqahtani:
A comparison of machine learning techniques for file system forensics analysis. 53-61 - Diego Renza
, Sebastián Mendoza, Dora M. Ballesteros L.
:
High-uncertainty audio signal encryption based on the Collatz conjecture. 62-69 - Subodh Kumar, Rajendra Kumar, Sushil Kumar, Sunil Kumar:
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. 70-83 - Jalesh Kumar, Shivananda Nirmala:
Securing the regions comprising information in a document image with novel key selection technique - a parallel approach. 84-95 - Hiep Cong Pham
, Linda Brennan, Steven Furnell:
Information security burnout: Identification of sources and mitigating factors from security demands and resources. 96-107
- Tapasi Bhattacharjee, Santi P. Maity:
Progressive and hierarchical share-in-share scheme over cloud. 108-120 - Rui Ferreira, Rui L. Aguiar
:
Repositioning privacy concerns: Web servers controlling URL metadata. 121-137
- Dimitrios Damopoulos, Georgios Kambourakis
:
Hands-Free one-Time and continuous authentication using glass wearable devices. 138-150 - Kyrylo Petrenko, Atefeh Mashatan, Farid Shirazi
:
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. 151-163 - Umesh Kumar Singh, Chanchala Joshi, Dimitris Kanellopoulos
:
A framework for zero-day vulnerabilities detection and prioritization. 164-172 - Neelam Dabas, Ram Pal Singh
:
ELM-Kernel and reduced kernel ELM based watermarking scheme. 173-192 - Hamssa Hasrouny, Abed Ellatif Samhat
, Carole Bassil
, Anis Laouiti:
Misbehavior detection and efficient revocation within VANET. 193-209 - Abdelrahman Altigani
, Shafaatunnur Hasan, Siti Mariyam Shamsuddin
, Bazara I. A. Barry:
A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. 210-221 - Mordechai Guri:
Optical air-gap exfiltration attack via invisible images. 222-230 - Rohit M. Thanki
, Ashish Kothari
, Deven Trivedi
:
Hybrid and blind watermarking scheme in DCuT - RDWT domain. 231-249 - Shanshan Li, Chunxiang Xu, Yuan Zhang
:
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. 250-258
- Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang:
Dynamic privacy leakage analysis of Android third-party libraries. 259-270 - Guoming Wang, Rongxing Lu, Cheng Huang, Yong Liang Guan:
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare. 271-280
- Arvind Bakshi
, Anoop Kumar Patel:
Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. 281-295 - Andrea Visconti, Ondrej Mosnácek, Milan Broz
, Vashek Matyás:
Examining PBKDF2 security margin - Case study of LUKS. 296-306
- Ngoc-Dung T. Tieu, Huy H. Nguyen
, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Spatio-temporal generative adversarial network for gait anonymization. 307-319 - Sudipta Kumar Ghosal
, Jyotsna Kumar Mandal
:
On the use of the Stirling Transform in image steganography. 320-330
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.